Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • tristayifei
    tristayifei at March 12,2015
    From my understanding, Backtrack is a similar software as Metasploit, and both two are very helpful tool for penetration testing and cybercrime forensic investigation. Based on the knowledge learned from Metasploit, I can gain a lot practical knowledge by watching an instruction video about how to use Backtrack. However, it is still really new to me, I watched it couple times to understand. I find it is interesting that employers can use this tool to monitor employees and be able to watch what they are doing on the network. I actually have question regarding this part: is it legal to do this survilliance?
  • dmoraval
    dmoraval at April 01,2015
    Good reconnaissance tool. It has many specific tools over this GUI. It helps you to do a great work on gathering data and Information analysis. In addition, this interface is used to other task like penetration testing or just checking performance on a network. The easy way how the speaker used the tools was nice. He goes through internal surveillance very quickly.
  • DPerry
    DPerry at April 08,2015
    This is definitely good to know if I ever do any penetration testing for my company or am contracted to do so for other companies. He's good at instructing and providing preferred methods and commands.
  • skatakam
    skatakam at April 29,2015
    Perfect an reconnaissance. All in one tool. Good Explanation. Time to start using Kali now :)
  • hhammadi
    hhammadi at May 05,2015
    The video demonstrates the power of backtrack and its utilization specifically for the tasks of forensic investigations. The video also tells us how we can use backtrack for investigating activities.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved